3 results (0.003 seconds)

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 0

A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants. This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0. • https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A security defect was identified in Foundry Issues. If a user was added to an issue on a resource that they did not have access to and consequently could not see, they could query Foundry's Notification API and receive metadata about the issue including the RID of the issue, severity, internal UUID of the author, and the user-defined title of the issue. • https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-420: Unprotected Alternate Channel •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Foundry Issues service versions 2.244.0 to 2.249.0 was found to be logging in a manner that captured sensitive information (session tokens). This issue was fixed in 2.249.1. Se ha detectado que el servicio Foundry Issues versiones 2.244.0 a 2.249.0, registraba información confidencial (tokens de sesión). Este problema ha sido corregido en versión 2.249.1 • https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md • CWE-532: Insertion of Sensitive Information into Log File •